A secure and efficient ID-based aggregate signature scheme for wireless sensor networks

Affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks (WSNs) research. In real settings, the WSNs have been broadly applied, such as target tracking and environment remote monitoring. However, data can be easily compromised by a vast...

Full description

Saved in:
Bibliographic Details
Main Authors: SHEN, Limin, MA, Jianfeng, LIU, Ximeng, WEI, Fushan, MIAO, Meixia
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2017
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/4121
https://ink.library.smu.edu.sg/context/sis_research/article/5124/viewcontent/Secure_Efficient_ID_Based_Aggregate_Signature_2017.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-5124
record_format dspace
spelling sg-smu-ink.sis_research-51242018-09-21T03:18:16Z A secure and efficient ID-based aggregate signature scheme for wireless sensor networks SHEN, Limin MA, Jianfeng LIU, Ximeng WEI, Fushan MIAO, Meixia Affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks (WSNs) research. In real settings, the WSNs have been broadly applied, such as target tracking and environment remote monitoring. However, data can be easily compromised by a vast of attacks, such as data interception and data tampering, etc. In this paper, we mainly focus on data integrity protection, give an identity-based aggregate signature (IBAS) scheme with a designated verifier for WSNs. According to the advantage of aggregate signatures, our scheme not only can keep data integrity, but also can reduce bandwidth and storage cost for WSNs. Furthermore, the security of our IBAS scheme is rigorously presented based on the computational Diffie-Hellman assumption in random oracle model. 2017-04-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4121 info:doi/10.1109/JIOT.2016.2557487 https://ink.library.smu.edu.sg/context/sis_research/article/5124/viewcontent/Secure_Efficient_ID_Based_Aggregate_Signature_2017.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University designated verifier identity-based (ID-based) coalition attack data aggregation unforgeability wireless sensor network (WSN) big data Aggregate signature Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic designated verifier
identity-based (ID-based)
coalition attack
data aggregation
unforgeability
wireless sensor network (WSN)
big data
Aggregate signature
Information Security
spellingShingle designated verifier
identity-based (ID-based)
coalition attack
data aggregation
unforgeability
wireless sensor network (WSN)
big data
Aggregate signature
Information Security
SHEN, Limin
MA, Jianfeng
LIU, Ximeng
WEI, Fushan
MIAO, Meixia
A secure and efficient ID-based aggregate signature scheme for wireless sensor networks
description Affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks (WSNs) research. In real settings, the WSNs have been broadly applied, such as target tracking and environment remote monitoring. However, data can be easily compromised by a vast of attacks, such as data interception and data tampering, etc. In this paper, we mainly focus on data integrity protection, give an identity-based aggregate signature (IBAS) scheme with a designated verifier for WSNs. According to the advantage of aggregate signatures, our scheme not only can keep data integrity, but also can reduce bandwidth and storage cost for WSNs. Furthermore, the security of our IBAS scheme is rigorously presented based on the computational Diffie-Hellman assumption in random oracle model.
format text
author SHEN, Limin
MA, Jianfeng
LIU, Ximeng
WEI, Fushan
MIAO, Meixia
author_facet SHEN, Limin
MA, Jianfeng
LIU, Ximeng
WEI, Fushan
MIAO, Meixia
author_sort SHEN, Limin
title A secure and efficient ID-based aggregate signature scheme for wireless sensor networks
title_short A secure and efficient ID-based aggregate signature scheme for wireless sensor networks
title_full A secure and efficient ID-based aggregate signature scheme for wireless sensor networks
title_fullStr A secure and efficient ID-based aggregate signature scheme for wireless sensor networks
title_full_unstemmed A secure and efficient ID-based aggregate signature scheme for wireless sensor networks
title_sort secure and efficient id-based aggregate signature scheme for wireless sensor networks
publisher Institutional Knowledge at Singapore Management University
publishDate 2017
url https://ink.library.smu.edu.sg/sis_research/4121
https://ink.library.smu.edu.sg/context/sis_research/article/5124/viewcontent/Secure_Efficient_ID_Based_Aggregate_Signature_2017.pdf
_version_ 1770574341335941120